Metrics
Affected Vendors & Products
Fri, 20 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pjsip pjsip
|
|
| CPEs | cpe:2.3:a:pjsip:pjsip:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pjsip pjsip
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pjsip
Pjsip pjproject |
|
| Vendors & Products |
Pjsip
Pjsip pjproject |
Fri, 20 Feb 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PJSIP is a free and open source multimedia communication library written in C. In versions 2.16 and below, there is a critical Heap-based Buffer Overflow vulnerability in PJSIP's H.264 unpacketizer. The bug occurs when processing malformed SRTP packets, where the unpacketizer reads a 2-byte NAL unit size field without validating that both bytes are within the payload buffer bounds. The vulnerability affects applications that receive video using H.264. A patch is available at https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491. | |
| Title | PJSIP has a Heap-based Buffer Overflow vulnerability in its H.264 unpacketizer | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-20T00:26:54.397Z
Updated: 2026-02-20T15:36:17.964Z
Reserved: 2026-02-16T22:20:28.612Z
Link: CVE-2026-26967
Updated: 2026-02-20T15:30:24.869Z
Status : Analyzed
Published: 2026-02-20T01:15:59.953
Modified: 2026-02-20T19:30:22.237
Link: CVE-2026-26967
ReportizFlow